Re: Prey and Hidden tracking stolen Mac computers

2011-06-21 Thread Wayne Stewart
People who get used computer, either stolen or just bought second hand
seldom wipe the HD. Usually there's applications they want to keep or
they're just lazy.

On Jun 1, 2:00 pm, Jonas Lopez  wrote:
> Prey and Hidden tracking stolen Mac computers
>
> What is to prevent the wipe of the hd and a new install to defeat these 
> needed applications?
>
> JML

-- 
You received this message because you are a member of G-Group, a group for 
those using G3, G4, and G5 desktop Macs - with a particular focus on Power Macs.
The list FAQ is at http://lowendmac.com/lists/g-list.shtml and our netiquette 
guide is at http://www.lowendmac.com/lists/netiquette.shtml
To post to this group, send email to g3-5-list@googlegroups.com
For more options, visit this group at http://groups.google.com/group/g3-5-list


Re: Prey and Hidden tracking stolen Mac computers

2011-06-09 Thread Bruce Johnson

On Jun 1, 2011, at 2:00 PM, Jonas Lopez wrote:

> Prey and Hidden tracking stolen Mac computers
> 
> What is to prevent the wipe of the hd and a new install to defeat these 
> needed applications?

Absolutely nothing.

That said...criminals tend to be really stupid. Hollyweird has warped our 
senses with this stuff, but in the main folks stealing computers in B&E's are 
generally drug addicts selling their loot to other drug addicts for drug money. 

You would be surprised how dumb they can be.

I knew someone who did a 5-year stretch for holding up the burger joint he 
worked at. He was careful to wear a mask over his face; sadly they figured out 
pretty quickly who it was when he get off his shift and walked in 10 minutes 
later (in the clothes he just left in) and said "this is a stick up. Give me 
all the money." Definitely a few bricks short of a load, that one.

So the software's definitely better than nothing.

-- 
Bruce Johnson
University of Arizona
College of Pharmacy
Information Technology Group

Institutions do not have opinions, merely customs


-- 
You received this message because you are a member of G-Group, a group for 
those using G3, G4, and G5 desktop Macs - with a particular focus on Power Macs.
The list FAQ is at http://lowendmac.com/lists/g-list.shtml and our netiquette 
guide is at http://www.lowendmac.com/lists/netiquette.shtml
To post to this group, send email to g3-5-list@googlegroups.com
For more options, visit this group at http://groups.google.com/group/g3-5-list


Prey and Hidden tracking stolen Mac computers

2011-06-09 Thread Jonas Lopez
Prey and Hidden tracking stolen Mac computers

What is to prevent the wipe of the hd and a new install to defeat these needed 
applications?

JML

-- 
You received this message because you are a member of G-Group, a group for 
those using G3, G4, and G5 desktop Macs - with a particular focus on Power Macs.
The list FAQ is at http://lowendmac.com/lists/g-list.shtml and our netiquette 
guide is at http://www.lowendmac.com/lists/netiquette.shtml
To post to this group, send email to g3-5-list@googlegroups.com
For more options, visit this group at http://groups.google.com/group/g3-5-list